default search action
17th IWDW 2018: Jeju Island, Korea
- Chang D. Yoo, Yun Qing Shi, Hyoung-Joong Kim, Alessandro Piva, Gwangsu Kim:
Digital Forensics and Watermarking - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings. Lecture Notes in Computer Science 11378, Springer 2019, ISBN 978-3-030-11388-9
Deep Neural Networks for Digital Forensics
- Jingyu Ye, Yuxi Shi, Guanshuo Xu, Yun-Qing Shi:
A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images. 3-13 - Qian Zhang, Xianfeng Zhao, Changjun Liu:
Convolutional Neural Network for Larger JPEG Images Steganalysis. 14-28 - Huilin Zheng, Xuan Li, Danyang Ruan, Xiangui Kang, Yun-Qing Shi:
Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis. 29-39 - Shiyang Zhang, Hong Zhang, Xianfeng Zhao, Haibo Yu:
A Deep Residual Multi-scale Convolutional Network for Spatial Steganalysis. 40-52
Steganalysis and Identification
- Kuan Yang, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Provably Secure Generative Steganography Based on Autoregressive Model. 55-68 - Akira Nishimura:
A Novel Steganalysis of Steghide Focused on High-Frequency Region of Audio Waveform. 69-82 - Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Wenjie Li:
Cycle GAN-Based Attack on Recaptured Images to Fool both Human and Machine. 83-92
Watermarking
- Jihyeon Kang, Sang-Keun Ji, Heung-Kyu Lee:
Spherical Panorama Image Watermarking Using Viewpoint Detection. 95-109 - Hannes Mareen, Johan De Praeter, Glenn Van Wallendael, Peter Lambert:
Traitor Tracing After Visible Watermark Removal. 110-123 - Yiming Xue, Kai Mu, Yan Li, Juan Wen, Ping Zhong, Shaozhang Niu:
Improved High Capacity Spread Spectrum-Based Audio Watermarking by Hadamard Matrices. 124-136 - Nicolò Cardamone, Fabrizio d'Amore:
DWT and QR Code Based Watermarking for Document DRM. 137-150 - David Niyitegeka, Gouenou Coatrieux, Reda Bellafqira, Emmanuelle Génin, Javier Franco-Contreras:
Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases - Application to Outsourced Genetic Data. 151-166
Reversible Data Hiding
- Bo Ou, Xiaolong Li, Wei Li, Yun-Qing Shi:
Pixel-Value-Ordering Based Reversible Data Hiding with Adaptive Texture Classification and Modification. 169-179 - Chang Song, Yifeng Zhang, Guojun Lu:
Reversible Data Hiding in Encrypted Images Based on Image Partition and Spatial Correlation. 180-194 - Bin Ma, Xiaoyu Wang, Bing Li, Yun-Qing Shi:
A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding. 195-205 - Yinyin Peng, Zhao-Xia Yin:
A Strategy of Distinguishing Texture Feature for Reversible Data Hiding Based on Histogram Shifting. 206-215 - Fan Chen, Yuan Yuan, Yuyu Chen, Hongjie He, Lingfeng Qu:
Reversible Data Hiding Scheme in Encrypted-Image Based on Prediction and Compression Coding. 216-229
Steganographic Algorithms
- Yi Dong, Tanfeng Sun, Xinghao Jiang:
A High Capacity HEVC Steganographic Algorithm Using Intra Prediction Modes in Multi-sized Prediction Blocks. 233-247 - Xinzhi Yu, Kejiang Chen, Weiming Zhang, Yaofei Wang, Nenghai Yu:
Improving the Embedding Strategy for Batch Adaptive Steganography. 248-260 - Shijun Zhou, Weixuan Tang, Shunquan Tan, Bin Li:
Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information. 261-274 - Chen Gong, Xiaowei Yi, Xianfeng Zhao:
Pitch Delay Based Adaptive Steganography for AMR Speech Stream. 275-289 - Théo Taburet, Louis Filstroff, Patrick Bas, Wadih Sawaya:
An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain. 290-303
Identification and Security
- Yuankun Huang, Shunquan Tan, Bin Li, Jiwu Huang:
VPCID - A VoIP Phone Call Identification Database. 307-321 - Reda Bellafqira, Gouenou Coatrieux, Emmanuelle Génin, Michel Cozic:
Secure Multilayer Perceptron Based on Homomorphic Encryption. 322-336 - Sondos M. Fadl, Qi Han, Qiong Li:
Surveillance Video Authentication Using Universal Image Quality Index of Temporal Average. 337-350
Special Session: Deep Generative Models for Forgery and Its Det
- Hakil Kim, Xuenan Cui, Man-Gyu Kim, Thi Hai Binh Nguyen:
Reconstruction of Fingerprints from Minutiae Using Conditional Adversarial Networks. 353-362 - Hyoungwoo Park, Minjeong Ju, Sangkeun Moon, Chang D. Yoo:
Unsupervised Domain Adaptation for Object Detection Using Distribution Matching in Various Feature Level. 363-372 - Muhammad Usama, Dong Eui Chang:
Towards Robust Neural Networks with Lipschitz Continuity. 373-389
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.